Results 41 to 50 of about 16,583 (248)
Formal correctness proofs, analytical tail bounds, and empirical failure studies provide strong guarantees for the Module-Lattice-Based Key-Encapsulation Mechanism (ML–KEM).
Eliseo Sarmiento Rosales +1 more
doaj +1 more source
Design of Rabin-like cryptosystem without decryption failure [PDF]
In this work, we design a new, efficient and practical Rabin-like cryptosystem without using the Jacobi symbol, redundancy in the message and avoiding the demands of extra information for finding the correct plaintext.
Asbullah, Muhammad Asyraf +1 more
core
Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials
Personal cryptographic keys are the foundation of many secure services, but storing these keys securely is a challenge, especially if they are used from multiple devices.
Brasser Ferdinand +4 more
core +1 more source
Plecstatin inhibits hepatocellular carcinoma tumorigenesis and invasion through cytolinker plectin
The ruthenium‐based metallodrug plecstatin exerts its anticancer effect in hepatocellular carcinoma (HCC) primarily through selective targeting of plectin. By disrupting plectin‐mediated cytoskeletal organization, plecstatin inhibits anchorage‐dependent growth, cell polarization, and tumor cell dissemination.
Zuzana Outla +10 more
wiley +1 more source
Random Oracles in a Quantum World [PDF]
The interest in post-quantum cryptography - classical systems that remain secure in the presence of a quantum adversary - has generated elegant proposals for new cryptosystems.
C.H. Bennett +25 more
core +3 more sources
Aged human bmMSCs are seeded in the scaffold. Osteoblastic induction can slightly increase cell's bone‐forming activity to produce bone‐like tissues, shown as the sporadic xylenol orange‐stained spots (the lower left image). Notably, pioglitazone plus EGCG co‐treatment dramatically increases cell's bone‐forming activity and bone‐like tissue production (
Ching‐Yun Chen +6 more
wiley +1 more source
Blockchain-based distributed EHR fine-grained traceability scheme
Aiming at the key management of electronic health records (EHR) in a distributed system and user identity tracing issues, a distributed EHR fine-grained traceability scheme based on blockchain was proposed.Combining chameleon hash and zero-knowledge ...
Zuobin YING +3 more
doaj +2 more sources
A Secure JTAG Wrapper for SoC Testing and Debugging
IEEE Std. 1149.1, also known as the Joint Test Access Group (JTAG) standard, provides excellent controllability and observability for ICs and hence is widely used in IC testing, debugging, failure analysis, or even online chip control/monitoring ...
Kuen-Jong Lee +2 more
doaj +1 more source
Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes
In this paper we investigate the impact of decryption failures on the chosen-ciphertext security of lattice-based primitives. We discuss a generic framework for secret key recovery based on decryption failures and present an attack on the NIST Post-Quantum Proposal ss-ntru-pke.
D Anvers, Jan-Pieter +5 more
openaire +1 more source
PARP inhibitors induce a senescence phenotype in non‐small cell lung carcinoma cell lines
Talazoparib is the most potent inducer of senescence among different PARP1 inhibitors in human NSCLC cells. In the absence of PARP, no senescence phenotype was observed, demonstrating that PARP1 is necessary for the induction of senescence by this inhibitor.
Camille Huart +7 more
wiley +1 more source

